Upgrade to Cisco Secure Workload Release 4.0
Upgrading Cisco Secure Workload clusters to the latest release is a critical maintenance activity that ensures continued access to new capabilities, security enhancements, and defect fixes. Before starting the upgrade, review the current deployment, verify cluster health, and confirm that backups and maintenance windows are in place to minimize operational impact.
This upgrade guide provides step-by-step instructions for moving Cisco Secure Workload deployments to the latest supported release. This guide is intended for Site reliability engineers (SRE) and platform teams responsible for planning, executing, and validating cluster upgrades in production and non‑production environments.
![]() Note |
Raise a ticket with Cisco Technical Assistance Center, to support you with the upgrade process. You must perform the upgrade procedures with Site Administrator or Customer Support privileges. Ensure that a Customer Support level account has an SSH key that is uploaded for troubleshooting purposes. |
Supported Upgrade Paths for Cisco Secure Workload4.0
The following table provides the supported upgrade paths from the earlier version of Cisco Secure Workload, 3.10.6.3 to the latest Cisco Secure Workload, 4.0.1.1.
![]() Note |
We recommend upgrading in the specified order without skipping any releases, unless otherwise specified. |
|
From |
To |
Upgrade Type |
|---|---|---|
|
4.0.2.5 |
4.0.3.13 |
Patch release upgrade |
|
4.0.1.1 |
4.0.2.5 |
Patch release upgrade |
|
3.10.6.3 |
4.0.1.1 |
Major release upgrade |
For supported upgrade paths earlier than Cisco Secure Workload, 4.0.1.1, refer to Supported Upgrade Paths for Secure Workload.
![]() Note |
Due to some critical issues in the Secure Workload, Release 4.0.1.1, we recommend that you upgrade to 4.0.2.5 immediately after upgrading to 4.0.1.1. For more information about these issues, refer to the Open Issues section in Cisco Secure Workload Release Notes, Release 4.0.1.1. |
IPv6 Support for Dual-Stack Mode in Secure Workload
Secure Workload clusters that run on physical hardware can be configured to use IPv6 in addition to IPv4 for certain communications to and from the clusters.
Guidelines
-
Configure both A and AAAA DNS records for FQDN before enabling dual-stack mode for your cluster.
-
External services such as NTP, SMTP, and DNS must be available over both IPv4 and IPv6, for redundancy purposes.
-
To configure dual-stack mode for a cluster, ensure the following:
-
Each of the two cluster-leaf switches must have routable IPv6 addresses on two different networks for redundancy. Provide a default gateway for each network.
-
For 39RU clusters, a site-routable IPv6 network with space for at least 29 host addresses is required.
-
For 8RU clusters, a site-routable IPv6 network with space for at least 20 host addresses is required.
-
The first three host addresses of the site-routable IPv6 network are reserved for the Cisco Secure Workload cluster HSRP configuration and must not be used by any other devices.
-
![]() Note |
|
Limitations
If you are considering enabling dual-stack mode, note these limitations:
-
You can enable IPv6 connectivity only during initial deployment or upgrade to a major release. You cannot enable this feature during patch upgrades.
-
Dual-stack mode is supported only on physical hardware or bare metal clusters.
-
IPv6-only mode is not supported if you enable dual-stack mode.
-
After you enable dual-stack mode for the cluster, the configuration remains dual stack.
-
Enable dual-stack mode only for clusters that are not configured with Federation.
-
The enforcement on AIX agents use only IPv4. Note that IPv4 is always enabled even if IPv6 is enabled.
If you have enabled IPv6:
-
You can access the Secure Workload web interface using either IPv6 or IPv4.
-
By default, software agents use IPv4 to connect to the cluster. To enable IPv6 communication with the cluster over IPv6, do this:
-
On the Secure Workload web interface, from the navigation pane, choose .
-
Configure the Sensor VIP FQDN setting. For more information, refer to the page-level help on the UI or the Cisco Secure Workload User Guide.
-
Licensing
![]() Note |
|
Upgrade to Cisco Secure Workload Release 4.0.x.x.
Upgrade to Cisco Secure Workload Release 4.0.3.13
-
In the browser, go to: https://software.cisco.com/download/home/286309796/type/286309874/release/4.0.3.13.
-
Download this RPM:
tetration_os_patch_k9-4.0.3.13-1.noarch.rpm -
Ensure that a Customer Support level account has an SSH key that is uploaded for troubleshooting purposes.
-
You must perform the following procedure as a user with Site Administrator or Customer Support privileges.
Before you begin
![]() Note |
Limitations
|
Procedure
|
Step 1 |
Check the system's health. You cannot perform the upgrade if a service is unhealthy. |
||
|
Step 2 |
From the navigation pane, choose . Follow the on-screen instructions to troubleshoot issues, if any, identified by the prechecks before continuing. |
||
|
Step 3 |
For a patch upgrade, ensure that you select Patch Upgrade. |
||
|
Step 4 |
Click Send Upgrade Link. |
||
|
Step 5 |
Look for an email message with the following subject:
The message includes a hyperlink that you must use to perform the upgrade. |
||
|
Step 6 |
In the email message, click the link to open the Secure Workload setup UI. |
||
|
Step 7 |
Click Choose File. |
||
|
Step 8 |
Select the downloaded patch RPM and click Open. |
||
|
Step 9 |
To initiate the upgrade, click Upload to upload the RPM.
|
||
|
Step 10 |
Click the Book icon to view the logs. |
||
|
Step 11 |
Verify the upgrade:
|
||
|
Step 12 |
After confirming that the upgrade is successful, click Disable Patch Upgrade Link. |
![]() Note |
When Secure Workload clusters are upgraded, the Edge and Ingest appliance controllers, along with the containerized services running on these appliances, are automatically upgraded to the corresponding cluster version. However, the underlying operating system (OS) on the appliances is not updated as part of this process. To ensure that the underlying OS includes the latest security updates and package enhancements, customers are advised to redeploy both the Edge and Ingest appliances using the latest Ingest OVA. Each major release provides updated OVA files that incorporate a newer operating system and the most recent software packages, delivering improved hardening and a strengthened security posture. The redeployment procedure requires decommissioning and removing the existing appliances, deploying new appliances using the latest OVA image while retaining the same IP addresses and configurations, and subsequently re-adding the connectors. Be advised that this activity results in a brief, planned interruption to telemetry ingestion. |
Upgrade to Cisco Secure Workload Release 4.0.2.5
-
In the browser, go to: https://software.cisco.com/download/home/286309796/type/286309874/release/4.0.2.5.
-
Download this RPM:
tetration_os_patch_k9-4.0.2.5-1.noarch.rpm -
Ensure that a Customer Support level account has an SSH key that is uploaded for troubleshooting purposes.
-
You must perform the following procedure as a user with Site Administrator or Customer Support privileges.
Before you begin
![]() Note |
Limitations
|
Procedure
|
Step 1 |
Check the system's health. You cannot perform the upgrade if a service is unhealthy. |
||
|
Step 2 |
From the navigation pane, choose . Follow the on-screen instructions to troubleshoot issues, if any, identified by the prechecks before continuing. |
||
|
Step 3 |
For a patch upgrade, ensure that you select Patch Upgrade. |
||
|
Step 4 |
Click Send Upgrade Link. |
||
|
Step 5 |
Look for an email message with the following subject:
The message includes a hyperlink that you must use to perform the upgrade. |
||
|
Step 6 |
In the email message, click the link to open the Secure Workload setup UI. |
||
|
Step 7 |
Click Choose File. |
||
|
Step 8 |
Select the downloaded patch RPM and click Open. |
||
|
Step 9 |
To initiate the upgrade, click Upload to upload the RPM.
|
||
|
Step 10 |
Click the Book icon to view the logs. |
||
|
Step 11 |
Verify the upgrade:
|
||
|
Step 12 |
After confirming that the upgrade is successful, click Disable Patch Upgrade Link. |
Upgrade to Cisco Secure Workload Release 4.0.1.1
You can upgrade from Secure Workload, Release 3.10.5.6 to Secure Workload, Release 4.0.1.1.
Procedure
|
Step 1 |
Go to https://software.cisco.com/download/home/286309796/type/286309874/release/ and download the applicable RPM files for your deployment. For an 8RU or 39RU system, download the following RPMs:
For virtual system, refer to Appendix 2: For a Virtual System to download the RPMs. |
||||
|
Step 2 |
Verify that the MD5 checksum of the downloaded RPMs matches the MD5 checksum on Cisco.com. |
||||
|
Step 3 |
Check the system's health. You cannot perform the upgrade if a service is unhealthy. |
||||
|
Step 4 |
Create a snapshot of the cluster to help troubleshoot any issues during the upgrade. To do this, from the navigation pane, choose .
|
||||
|
Step 5 |
Proceed for the upgrade after taking a Snapshot of the cluster. From the navigation pane, choose . |
||||
|
Step 6 |
Under the Upgrade tab, ensure that you follow the on-screen instructions, do not skip any steps. |
||||
|
Step 7 |
Troubleshoot issues, if any, identified during the prechecks before proceeding to the next step. Click Generate Upgrade link. The logged in site administrator or customer support receives an email with the subject:
|
||||
|
Step 8 |
In the Secure Workload setup portal:
|
||||
|
Step 9 |
Click Install to deploy the RPM files. The operation typically takes a few minutes. If the uploaded files do not display after 10–15 minutes, refresh the page.
|
||||
|
Step 10 |
After the RPM files installation is complete, click Continue, the Site Config portal is displayed. For information on how to configure the cluster set up, refer to Appendix1: Site Configuration in Secure Workload Setup. During the upgrade process, perform the following checks to ensure:
After the checks are complete, an email with the subject is sent to the user:
TETRATION CLUSTER MyCluster: Verify Token.
|
||||
|
Step 11 |
Copy the token from the email subject:
|
||||
|
Step 12 |
Verify the upgrade: In Cisco Secure Workload, releases 4.0 and earlier, the orchestrator VMs upgrade before other components. This process takes between 30 to 60 minutes as the progress bar moves from 0 to 95%. After the orchestrator upgrade is complete, the remaining components are upgraded. At this point, the progress bar resets to 0%. After the upgrade is complete, the site administrator loads a certificate in the UI ). For more information on how to upload the SSL certificate, see Maintenance UI. |
Appendix 1: Site Configuration in Secure Workload Setup
Starting with Cisco Secure Workload, Release 3.10 and later, SMTP configuration settings are now available under the Email and Authentication tab. During the cluster setup, Site Admins use the SMTP Configuration switch to enable or disable the SMTP settings. However, note that you cannot modify these settings while the upgrade is in progress.
Secure Workload now supports configuration of SMTP using Microsoft Modern Authentication (OAuth) in addition to the basic SMTP authentication. This enhancement offers improved security through industry-standard OAuth 2.0 when connecting to Microsoft SMTP servers. For more information, see SMTP Server Configuration for Cluster and Site Configuration.
![]() Note |
Starting from Cisco Secure Workload, Release 3.8 and later, non-ASCII characters are not allowed in any text fields for Site configurations using the Cisco Secure Workload Setup UI. |
This section explains the process of Site Admins setting up a site during the Secure Workload cluster set up.
-
Under the General tab, change the SSH public key and click Next.

Note
Starting with Cisco Secure Workload, Release 3.10, the Email tab is renamed to Email and Authentication tab. SMTP configuration settings, previously located under the Services tab, are now found under the Email and Authentication tab. A new SMTP configuration switch appears in this tab; however, you cannot modify the settings during an upgrade.
-
Under Email and Authentication, change the UI admin or the admin email address and click Next.
-
(Optional) Under L3, enable the cluster to use IPv6 addresses in addition to IPv4 for certain cluster connectivity after the upgrade. To enable IPv6:
-
Select the IPv6 check box.
-
Enter IPv6 addresses in CIDR notation for both Leaf 1 and Leaf 2 switches.
-
Enter the Leaf1 and Leaf2 IPv6 default gateway.
-
Click Next.
If you enable IPv6 on this page, you must also configure IPv6 fields on the Network page, described in the next step. For requirements and limitations on dual stack mode, see the Requirements and Limitations for Dual-Stack Mode (IPv6 Support) section.
-
-
Under Network:
-
If necessary, change the values for CIMC Internal Network, CIMC Internal Network Gateway, DNS Resolver, and DNS Domain.

Important
Do not change or remove the existing External Network value. However, you can add more IPv4 networks.
-
If IPv6 is enabled on the L3 page, the IPv6 check box is automatically selected. To specify the IPv6 addresses that are reserved for Cisco Secure Workload, use the approved IPv6 addresses:
-
Enter IPv6 External Network in CIDR notation.
-
(Optional) To use IPv6 only for specified addresses, enter individual External IPv6 IPs.
-
-
-
Under Service, change the NTP and SMTP values and click Next.
-
Under Security, enable or disable Strong SSL Ciphers for Agent Connections and click Next. Note that the values entered for the UI, Advanced, and Recovery tabs cannot be changed.
-
(Optional) Under Recovery, if the cluster is configured as a standby cluster, the cluster will deploy in standby mode, which includes reduced functionality (supports only warm standby mode).
-
Click Continue.
-
The following checks are performed during the upgrade process to ensure:
-
the RPM versions are correct.
-
the cluster is healthy.
-
the site information you provided is valid.
-
the physical clusters are configured correctly and may be upgraded to a newer version of NX-OS software.
-
information fields are validated.
-
NTP is synchronized before deployment starts.
-
name node and secondary name node are not in a failed-over state.

Note
On physical clusters, if switches need to be upgraded, the checks can take several minutes to an hour. After the checks are complete, an email with the subject is sent to the user:
TETRATION CLUSTER MyCluster: Verify Token. Copy the token from the email and use it to continue with the upgrade.
-
-
Appendix 2: For a Virtual System
For a virtual system, download the applicable RPM files for your deployment:
Procedure
|
Step 1 |
Go to https://software.cisco.com/download/home/286309796/type/286309874/release/. |
||
|
Step 2 |
Download these RPM files for your deployment:
|
Feedback